A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES

Anahtar Kelimeler:

-

A HYBRID STEGANOGRAPHIC APPROACH VIA WEB ADRESSES

With the rapid growth of information technology and internet, security has become a critical issue. Therefore, data hiding gained importance for delivering secret messages. Data hiding techniques hide messages such as images, videos, texts, etc. A data hiding technique is different from cryptology. A cryptographic scheme encrypts the message and then the message is sent, which is more secure and unpredictable, to the receiver’s side. Since the message has a meaningless and uncommon content, the communication makes the observer aware of the exchange, so there is always a threat from a malicious attacker.Steganography is the art of writing secret data in such a way that no one except the intended receiver knows about the existence of secret data. Successful steganography depends on the carrier medium not to raise attention. In this study, a steganographic scheme that employs URL of web pages, has been proposed. Images have been used as the carriers. LZW coding and DES cryption algorithms have been used to increase the security. Experimental results showed that the proposed method is feasible for any communication between two parties. Since the communication is performed via only a web address, it does not raise suspicion in case of an observation.

___

  • Huang, H. C., and Fang, W. C., (2010). Techniques and applications of intelligent multimedia data hiding, Telecommunication Systems, 44(3-4):241-251.
  • Weng, C. Y., Tso, H. K., Wang, S. J., (2012). Steganographic data hiding in image processing using predictive differencing, Opto-Electronics Review, 20(2):126-133. Swain, G., and Lenka, S. K., (2013). Steganography using two sided, three sided, and four sided side match methods, CSI Transactions on ICT, 1(2):127-133.
  • Cheddad, A., Condell, J., Curran, K., McKevitt, P., (2010). Digital image steganography: Survey and analysis of current methods, Signal Processing, 90(3):727-752.
  • Satir, E., and Isik, H., (2012). A compression-based text steganography method, Journal of Systems and Software, 85(10): 2385-2394.
  • Ioannidou, A., Halkidis, S., T., Stephanides, G., (2012). A novel technique for image steganography based on a high payload method and edge detection, Expert Systems with Applications, 39(14): 11517–11524.
  • Bailey, K., and Curran, K., (2006). An evaluation of image based steganography methods using visual inspection and automated detection techniques, Multimedia Tools and Applications, 31(3):327.
  • Fu, Y., Zhang, R., Ma, S., Qu, Z., Nıu, X., Yang, Y., (2009). Fast coding in digital steganography, The Journal of China Universities of Posts and Telecommunications, 16(6):92-96. http://www.tr.lipsum.com/feed/html, (Last Accessed: 28.11.2013).